[PDF][PDF] An analytical study of cellular automata and its applications in cryptography

G Kumaresan, NP Gopalan - International journal of computer …, 2017 - mecs-press.org
Security and confidentiality are the major concerns in information technology enabled
services wherein data security, user authentication, industrial security and message …

Reversible cellular automata with penta-cyclic rule and ECCs

I Siap, H Akin, ME Koroglu - International Journal of Modern Physics …, 2012 - World Scientific
The reversibility problem for linear cellular automata with null boundary defined by a rule
matrix in the form of a pentadiagonal matrix was studied over the binary field ℤ2 by Martín …

Cellular automata and cryptography

T Santos - 2014 - search.proquest.com
This thesis gives an introduction to cellular automata and their applications in cryptography.
We can find references to cryptographic techniques as far as the 1900 BC. Since then …

CellTCS: A Secure threshold cryptography scheme based on non-linear hybrid cellular automata

J Jakhar, P Dey, M Dutta, DK Bhattacharyya - Procedia Technology, 2012 - Elsevier
This paper presents a secure threshold cryptography scheme, referred here as CellTCS,
designed based on the features of non–linear hybrid Cellular Automata. CellTCS generates …

[PDF][PDF] Cellular automata and cryptography

TC dos Santos - 2014 - repositorio-aberto.up.pt
This thesis gives an introduction to cellular automata and their applications in cryptography.
We can find references to cryptographic techniques as far as the 1900 BC. Since then …